pypdf has possible long runtimes/large memory usage for large /ToUnicode streams
Description
Published to the GitHub Advisory Database
Feb 18, 2026
Reviewed
Feb 18, 2026
Published by the National Vulnerability Database
Feb 20, 2026
Last updated
Feb 23, 2026
Impact
An attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the
/ToUnicodeentry of a font with unusually large values, for example during text extraction.Patches
This has been fixed in pypdf==6.7.1.
Workarounds
If you cannot upgrade yet, consider applying the changes from PR #3646.
References